schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108300",
"label": "benign",
"label_confidence": 0.526,
"severity": "medium",
"timestamp": "2026-01-06T18:20:00Z",
"trace_id": "1e49dea2-e69d-f195-83cc-64960aafe40a"
} | {
"account_age_days": 921,
"account_id": "ACCT-355E7A4DFD4F",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.775
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 726,
"timestamp": "2026-01-06T18:20:00Z",
"transaction_amount_usd": 5691.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1281.37,
"financial_exposure_usd": 1354.06,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103653",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "low",
"timestamp": "2026-01-03T12:53:00Z",
"trace_id": "233506c1-0dd1-87bc-d33c-37b667e8ce4e"
} | {
"account_age_days": 1469,
"account_id": "ACCT-1C855E929937",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.868
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 216,
"timestamp": "2026-01-03T07:38:00Z",
"transaction_amount_usd": 23.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.813,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2916656.9,
"financial_exposure_usd": 5395350,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102096",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-02T10:56:00Z",
"trace_id": "76f7e909-3ff3-16f3-6e1b-a4b5bc1bf9a7"
} | {
"account_age_days": 1536,
"account_id": "ACCT-E4A58D8B5903",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 824,
"timestamp": "2026-01-02T10:56:00Z",
"transaction_amount_usd": 57858.86
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 423743.48,
"financial_exposure_usd": 571096.49,
"recoverable_pct": 0.342
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107954",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-06T12:34:00Z",
"trace_id": "1a9c0ece-38a2-79fb-b3b8-7b2d5a64fddd"
} | {
"account_age_days": 1294,
"account_id": "ACCT-5769966AB3D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.25
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 271,
"timestamp": "2026-01-06T07:11:00Z",
"transaction_amount_usd": 3.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1416.59,
"financial_exposure_usd": 1662.96,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101057",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-01T17:37:00Z",
"trace_id": "7d0b1599-0d6a-4835-3212-ee3b16198e74"
} | {
"account_age_days": 1832,
"account_id": "ACCT-5F2FEA66AC89",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_3",
"session_entropy": 0.442
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 798,
"timestamp": "2026-01-01T17:37:00Z",
"transaction_amount_usd": 18085.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 283733.36,
"financial_exposure_usd": 300869.36,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105020",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-04T11:40:00Z",
"trace_id": "c66fecc2-ea92-ad30-a06f-5d6648fb12ba"
} | {
"account_age_days": 1249,
"account_id": "ACCT-42FB8F4F7154",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.906
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 887,
"timestamp": "2026-01-04T11:40:00Z",
"transaction_amount_usd": 695874.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.518,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1535947.06,
"financial_exposure_usd": 1752079.94,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109092",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-07T07:32:00Z",
"trace_id": "d83cf85d-b067-5c61-29dd-fa169b8ef823"
} | {
"account_age_days": 682,
"account_id": "ACCT-F674EBC6471E",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 99,
"timestamp": "2026-01-07T01:34:00Z",
"transaction_amount_usd": 10.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2813.95,
"financial_exposure_usd": 2890.58,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106932",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-05T19:32:00Z",
"trace_id": "49899739-e29d-5838-ef9c-f6429f38ff6f"
} | {
"account_age_days": 1232,
"account_id": "ACCT-539F827A130B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.565
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 828,
"timestamp": "2026-01-05T19:32:00Z",
"transaction_amount_usd": 4270.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.519,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1761.92,
"financial_exposure_usd": 2346.57,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105430",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-04T18:30:00Z",
"trace_id": "5e68bee0-4952-8698-a1b2-f2804d2bb893"
} | {
"account_age_days": 1900,
"account_id": "ACCT-B7ACA35189B3",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.852
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 726,
"timestamp": "2026-01-04T18:30:00Z",
"transaction_amount_usd": 1589642.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.511,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2580291.96,
"financial_exposure_usd": 3221206.03,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100795",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-01T13:15:00Z",
"trace_id": "2745dd4f-a211-236b-43a7-255b7166cd19"
} | {
"account_age_days": 229,
"account_id": "ACCT-980AD348A866",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.39
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1168,
"timestamp": "2026-01-01T13:15:00Z",
"transaction_amount_usd": 48707.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1496759.89,
"financial_exposure_usd": 1573505.12,
"recoverable_pct": 0.353
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100905",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-01T15:05:00Z",
"trace_id": "c5784a40-a3b9-591d-3755-2a80b56b1afe"
} | {
"account_age_days": 1820,
"account_id": "ACCT-8B6C881D0A63",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_1",
"session_entropy": 0.478
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 827,
"timestamp": "2026-01-01T15:05:00Z",
"transaction_amount_usd": 9609.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.586,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 677462.17,
"financial_exposure_usd": 1255967.24,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100259",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-01T04:19:00Z",
"trace_id": "252ac83c-1d7b-ca5c-f7a8-7bc59bd39476"
} | {
"account_age_days": 754,
"account_id": "ACCT-31934D229766",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 315,
"timestamp": "2025-12-31T21:08:00Z",
"transaction_amount_usd": 5.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.854,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 803350.69,
"financial_exposure_usd": 906431.16,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104826",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-04T08:26:00Z",
"trace_id": "d3e85daa-878b-1861-251b-f85b456d5a07"
} | {
"account_age_days": 645,
"account_id": "ACCT-051FB5183EF4",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.699
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 144,
"timestamp": "2026-01-03T21:41:00Z",
"transaction_amount_usd": 6.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5284838.16,
"financial_exposure_usd": 6320547.17,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109410",
"label": "benign",
"label_confidence": 0.471,
"severity": "high",
"timestamp": "2026-01-07T12:50:00Z",
"trace_id": "3406cbdd-fb39-d488-565c-755ab07ff730"
} | {
"account_age_days": 840,
"account_id": "ACCT-9EFEB5498210",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.428
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 531,
"timestamp": "2026-01-07T12:50:00Z",
"transaction_amount_usd": 1038.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5205.93,
"financial_exposure_usd": 6349.67,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109558",
"label": "benign",
"label_confidence": 0.656,
"severity": "critical",
"timestamp": "2026-01-07T15:18:00Z",
"trace_id": "b6d182b3-c6c1-2d29-1079-042639848bb1"
} | {
"account_age_days": 91,
"account_id": "ACCT-DC7DFA22687E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.297
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 184,
"timestamp": "2026-01-07T15:18:00Z",
"transaction_amount_usd": 8830.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2024.08,
"financial_exposure_usd": 5019.22,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109160",
"label": "benign",
"label_confidence": 0.507,
"severity": "medium",
"timestamp": "2026-01-07T08:40:00Z",
"trace_id": "42c5c2a1-0c32-f175-2354-3e7897aa1045"
} | {
"account_age_days": 1387,
"account_id": "ACCT-34700E0602E8",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_1",
"session_entropy": 0.535
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 359,
"timestamp": "2026-01-07T00:07:00Z",
"transaction_amount_usd": 10.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1862.75,
"financial_exposure_usd": 2028.34,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101764",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "medium",
"timestamp": "2026-01-02T05:24:00Z",
"trace_id": "78d1f422-0667-073c-0637-aae89e7c0c01"
} | {
"account_age_days": 677,
"account_id": "ACCT-0E368D8569B6",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_2",
"session_entropy": 0.502
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 234,
"timestamp": "2026-01-01T23:44:00Z",
"transaction_amount_usd": 10.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.893,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 741511.23,
"financial_exposure_usd": 807642.55,
"recoverable_pct": 0.151
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104832",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "critical",
"timestamp": "2026-01-04T08:32:00Z",
"trace_id": "a6be28b3-3827-0a5e-f67c-c8b4e9a7a235"
} | {
"account_age_days": 1080,
"account_id": "ACCT-88CA33078EA4",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 901,
"timestamp": "2026-01-04T08:32:00Z",
"transaction_amount_usd": 223530.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3278253.79,
"financial_exposure_usd": 4013191.07,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109359",
"label": "benign",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-07T11:59:00Z",
"trace_id": "7b798935-83e2-33f2-5778-d1b015e0cfb7"
} | {
"account_age_days": 1240,
"account_id": "ACCT-907243BA6819",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 208,
"timestamp": "2026-01-07T11:59:00Z",
"transaction_amount_usd": 8931.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 743.49,
"financial_exposure_usd": 1336.56,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108602",
"label": "benign",
"label_confidence": 0.547,
"severity": "high",
"timestamp": "2026-01-06T23:22:00Z",
"trace_id": "009cb513-cd59-d51d-649e-3262cbc6599a"
} | {
"account_age_days": 1013,
"account_id": "ACCT-3F7F67BE0763",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.91
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 319,
"timestamp": "2026-01-06T16:43:00Z",
"transaction_amount_usd": 18.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3953.64,
"financial_exposure_usd": 5337.81,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104369",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "low",
"timestamp": "2026-01-04T00:49:00Z",
"trace_id": "d2a9d632-2887-2b40-e50e-9097f9551822"
} | {
"account_age_days": 325,
"account_id": "ACCT-7ED6B23B115A",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_2",
"session_entropy": 0.712
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 146,
"timestamp": "2026-01-03T21:25:00Z",
"transaction_amount_usd": 15.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.401,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5505611.35,
"financial_exposure_usd": 6652500.55,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103734",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-03T14:14:00Z",
"trace_id": "2824b3ed-2f58-3954-bfbb-275bcc12489b"
} | {
"account_age_days": 55,
"account_id": "ACCT-D5863AA284F7",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_3",
"session_entropy": 0.722
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 850,
"timestamp": "2026-01-03T14:14:00Z",
"transaction_amount_usd": 57695.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.938,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3687796.18,
"financial_exposure_usd": 4045067.4,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102329",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T14:49:00Z",
"trace_id": "306c1dfe-4088-47e0-c190-5cd503ced7d1"
} | {
"account_age_days": 901,
"account_id": "ACCT-E76D6D3EFB67",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.329
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 557,
"timestamp": "2026-01-02T14:49:00Z",
"transaction_amount_usd": 105965.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.584,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 175661.01,
"financial_exposure_usd": 427420.88,
"recoverable_pct": 0.296
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107574",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-06T06:14:00Z",
"trace_id": "b13ad575-f388-9ad5-5a47-5b59c27b320d"
} | {
"account_age_days": 921,
"account_id": "ACCT-401CCB0FDD08",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_1",
"session_entropy": 0.33
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 335,
"timestamp": "2026-01-06T00:13:00Z",
"transaction_amount_usd": 19.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 891.15,
"financial_exposure_usd": 1258.01,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106217",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-05T07:37:00Z",
"trace_id": "47139b84-1cbb-5aa5-682e-7e3810f88974"
} | {
"account_age_days": 1511,
"account_id": "ACCT-A7F37782704F",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 142,
"timestamp": "2026-01-05T00:14:00Z",
"transaction_amount_usd": 15.39
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2377182.85,
"financial_exposure_usd": 3614830.74,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104026",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-03T19:06:00Z",
"trace_id": "1fcd250e-7344-0179-b069-604afba286c4"
} | {
"account_age_days": 508,
"account_id": "ACCT-46EE157B94A9",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.104
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 173,
"timestamp": "2026-01-03T11:14:00Z",
"transaction_amount_usd": 23.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4041825.83,
"financial_exposure_usd": 8447845.07,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100385",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "low",
"timestamp": "2026-01-01T06:25:00Z",
"trace_id": "f3acca68-5d5f-fefd-3f35-bd0d5e9f40f8"
} | {
"account_age_days": 1895,
"account_id": "ACCT-8900F54701F5",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.879
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 658,
"timestamp": "2026-01-01T06:25:00Z",
"transaction_amount_usd": 69631.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 825479.26,
"financial_exposure_usd": 1053787.43,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104598",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "high",
"timestamp": "2026-01-04T04:38:00Z",
"trace_id": "45c1d882-122f-a0db-656b-ef1e6e674324"
} | {
"account_age_days": 474,
"account_id": "ACCT-70D63FC42396",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_2",
"session_entropy": 0.845
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1186,
"timestamp": "2026-01-04T04:38:00Z",
"transaction_amount_usd": 309939.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2474719.09,
"financial_exposure_usd": 3186889.56,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108031",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-06T13:51:00Z",
"trace_id": "943bb54a-3799-5576-0ee6-a03b7389229f"
} | {
"account_age_days": 1538,
"account_id": "ACCT-5CE012D834E2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 661,
"timestamp": "2026-01-06T13:51:00Z",
"transaction_amount_usd": 11885.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3296.43,
"financial_exposure_usd": 3986.28,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101410",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-01T23:30:00Z",
"trace_id": "53de564b-c1e1-6e01-095d-54fa499e191b"
} | {
"account_age_days": 727,
"account_id": "ACCT-95DE5B003698",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 382,
"timestamp": "2026-01-01T23:30:00Z",
"transaction_amount_usd": 109862.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 911080.16,
"financial_exposure_usd": 933698.17,
"recoverable_pct": 0.218
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107728",
"label": "benign",
"label_confidence": 0.531,
"severity": "high",
"timestamp": "2026-01-06T08:48:00Z",
"trace_id": "308cb258-359a-57dc-59f7-fd29a158c2d8"
} | {
"account_age_days": 1881,
"account_id": "ACCT-0BBF98254736",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.798
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 274,
"timestamp": "2026-01-06T08:48:00Z",
"transaction_amount_usd": 12010.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2674.48,
"financial_exposure_usd": 5176.18,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100723",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-01T12:03:00Z",
"trace_id": "29d31fe2-c826-60b9-a5c2-0bdc881da6a4"
} | {
"account_age_days": 1050,
"account_id": "ACCT-45C676C30FFB",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_3",
"session_entropy": 0.829
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 450,
"timestamp": "2026-01-01T12:03:00Z",
"transaction_amount_usd": 95817.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.893,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 799259.83,
"financial_exposure_usd": 869053.88,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109775",
"label": "benign",
"label_confidence": 0.556,
"severity": "low",
"timestamp": "2026-01-07T18:55:00Z",
"trace_id": "9cb1edc8-50cb-b3e8-65f7-72ef473e5302"
} | {
"account_age_days": 1821,
"account_id": "ACCT-7FAAF34AF3C2",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.785
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1092,
"timestamp": "2026-01-07T18:55:00Z",
"transaction_amount_usd": 8111.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3062.71,
"financial_exposure_usd": 3656.65,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109764",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-07T18:44:00Z",
"trace_id": "5c52dfb5-f778-d7b2-ebf2-abb326fae079"
} | {
"account_age_days": 1968,
"account_id": "ACCT-6032AE839235",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 162,
"timestamp": "2026-01-07T18:44:00Z",
"transaction_amount_usd": 6194.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.45,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4499.62,
"financial_exposure_usd": 4530.24,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107224",
"label": "benign",
"label_confidence": 0.491,
"severity": "low",
"timestamp": "2026-01-06T00:24:00Z",
"trace_id": "3d96140f-0f8f-2644-eec8-199f5d3e3a5c"
} | {
"account_age_days": 1011,
"account_id": "ACCT-B879B9A8C355",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.152
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 453,
"timestamp": "2026-01-06T00:24:00Z",
"transaction_amount_usd": 2323.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.582,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2772.39,
"financial_exposure_usd": 3367.18,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105638",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-04T21:58:00Z",
"trace_id": "645bc453-4ead-3673-fd53-932df3c1a9bb"
} | {
"account_age_days": 1788,
"account_id": "ACCT-636A1B00D3A0",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.245
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 689,
"timestamp": "2026-01-04T21:58:00Z",
"transaction_amount_usd": 1953415.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.696,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2535798.7,
"financial_exposure_usd": 2830661.74,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107952",
"label": "benign",
"label_confidence": 0.479,
"severity": "medium",
"timestamp": "2026-01-06T12:32:00Z",
"trace_id": "e77d4c41-1e99-df44-ee0f-9c9cb2e4e6eb"
} | {
"account_age_days": 45,
"account_id": "ACCT-D4ED0B3C1A05",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1003,
"timestamp": "2026-01-06T12:32:00Z",
"transaction_amount_usd": 7210.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2334.12,
"financial_exposure_usd": 4458.88,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108430",
"label": "benign",
"label_confidence": 0.566,
"severity": "high",
"timestamp": "2026-01-06T20:30:00Z",
"trace_id": "5b8b9136-3b4c-aff2-0d76-7a8a3a94c725"
} | {
"account_age_days": 1094,
"account_id": "ACCT-F4197A90BC35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.349
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 981,
"timestamp": "2026-01-06T20:30:00Z",
"transaction_amount_usd": 9481.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4627.62,
"financial_exposure_usd": 7315.55,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104263",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "high",
"timestamp": "2026-01-03T23:03:00Z",
"trace_id": "a357ee9b-5c95-0e6f-e1f6-b39fb24c3de6"
} | {
"account_age_days": 1883,
"account_id": "ACCT-161F149AAEB9",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_1",
"session_entropy": 0.798
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 354,
"timestamp": "2026-01-03T21:42:00Z",
"transaction_amount_usd": 24.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.823,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3630723.74,
"financial_exposure_usd": 4446357.33,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106503",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-05T12:23:00Z",
"trace_id": "9c310caf-fdf0-4c81-d683-84493ca1b0a7"
} | {
"account_age_days": 600,
"account_id": "ACCT-62187DC7A65E",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.1
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1027,
"timestamp": "2026-01-05T12:23:00Z",
"transaction_amount_usd": 2582661.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1780493.18,
"financial_exposure_usd": 3490065.82,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106625",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-05T14:25:00Z",
"trace_id": "0b9a769f-05ec-9897-2d5a-d2efc47361d8"
} | {
"account_age_days": 1912,
"account_id": "ACCT-B53B7E952EB2",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.273
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 305,
"timestamp": "2026-01-05T14:25:00Z",
"transaction_amount_usd": 2399478.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.644,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1343294.62,
"financial_exposure_usd": 2818603.8,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108394",
"label": "benign",
"label_confidence": 0.587,
"severity": "low",
"timestamp": "2026-01-06T19:54:00Z",
"trace_id": "79c71221-8472-ecee-a75f-42949914772a"
} | {
"account_age_days": 632,
"account_id": "ACCT-9079EC168D68",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 98,
"timestamp": "2026-01-06T19:54:00Z",
"transaction_amount_usd": 11080.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2504.24,
"financial_exposure_usd": 4802.76,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109885",
"label": "benign",
"label_confidence": 0.571,
"severity": "high",
"timestamp": "2026-01-07T20:45:00Z",
"trace_id": "f6309820-ea00-f014-6b09-0892520ea003"
} | {
"account_age_days": 159,
"account_id": "ACCT-E2C2EE668C3D",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_3",
"session_entropy": 0.681
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 142,
"timestamp": "2026-01-07T14:57:00Z",
"transaction_amount_usd": 22.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5219.04,
"financial_exposure_usd": 9010.42,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101790",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-02T05:50:00Z",
"trace_id": "efa27bea-a6b0-8407-0d43-0f717f066308"
} | {
"account_age_days": 1906,
"account_id": "ACCT-CFBDF54BFA2F",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.82
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1182,
"timestamp": "2026-01-02T05:50:00Z",
"transaction_amount_usd": 55913.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 397065.09,
"financial_exposure_usd": 494375.35,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104727",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-04T06:47:00Z",
"trace_id": "e479cd28-ce78-6dbc-d4c4-95ca42b471a9"
} | {
"account_age_days": 1463,
"account_id": "ACCT-3E0A642309D4",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 325,
"timestamp": "2026-01-04T00:50:00Z",
"transaction_amount_usd": 8.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2655774.12,
"financial_exposure_usd": 5510469.05,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104454",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "critical",
"timestamp": "2026-01-04T02:14:00Z",
"trace_id": "ffea4be0-611b-32e5-2b26-e00bab20526e"
} | {
"account_age_days": 122,
"account_id": "ACCT-0FBE024DFF56",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 296,
"timestamp": "2026-01-03T22:30:00Z",
"transaction_amount_usd": 22.69
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.386,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2485362.17,
"financial_exposure_usd": 2544393.88,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105083",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-04T12:43:00Z",
"trace_id": "fc95dfbb-2ba8-504e-ed12-950b7692ec45"
} | {
"account_age_days": 1750,
"account_id": "ACCT-66D61E50222B",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.784
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 399,
"timestamp": "2026-01-04T03:21:00Z",
"transaction_amount_usd": 9.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.856,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4418452.8,
"financial_exposure_usd": 6448756.66,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103961",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-03T18:01:00Z",
"trace_id": "ceffcb69-f549-89eb-3512-21b4e0990f4f"
} | {
"account_age_days": 1638,
"account_id": "ACCT-59DCD7000928",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.505
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 713,
"timestamp": "2026-01-03T18:01:00Z",
"transaction_amount_usd": 561727.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4541401.53,
"financial_exposure_usd": 8590435.34,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105118",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-04T13:18:00Z",
"trace_id": "8ae3be7a-0b2f-adad-e34b-9b40d0e989e0"
} | {
"account_age_days": 1486,
"account_id": "ACCT-149F625359D1",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.604
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 170,
"timestamp": "2026-01-04T02:50:00Z",
"transaction_amount_usd": 12.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2617210.91,
"financial_exposure_usd": 4764359.09,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100294",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-01T04:54:00Z",
"trace_id": "25fc57c7-1068-1724-edcc-6a9561aa142d"
} | {
"account_age_days": 1189,
"account_id": "ACCT-A9CD17503B63",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 134,
"timestamp": "2025-12-31T18:11:00Z",
"transaction_amount_usd": 22.43
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.795,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 339109.64,
"financial_exposure_usd": 390293.26,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100362",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-01T06:02:00Z",
"trace_id": "c2255b2c-37f8-1f31-7ad1-ef0251bd838f"
} | {
"account_age_days": 171,
"account_id": "ACCT-8B76011A5B53",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_3",
"session_entropy": 0.341
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 829,
"timestamp": "2026-01-01T06:02:00Z",
"transaction_amount_usd": 25393.36
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.511,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 413488.55,
"financial_exposure_usd": 631456.78,
"recoverable_pct": 0.376
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104034",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-03T19:14:00Z",
"trace_id": "a3c3abbb-c49c-4000-3e0b-aa5a6cc7f32e"
} | {
"account_age_days": 1618,
"account_id": "ACCT-0361E3341900",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.886
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 860,
"timestamp": "2026-01-03T19:14:00Z",
"transaction_amount_usd": 614705.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.546,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2124856.45,
"financial_exposure_usd": 4610070.68,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106634",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-05T14:34:00Z",
"trace_id": "e4eb33a9-3b28-e322-78f2-3d43429fd6a9"
} | {
"account_age_days": 38,
"account_id": "ACCT-AA3A847384A9",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 124,
"timestamp": "2026-01-05T08:26:00Z",
"transaction_amount_usd": 21.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.634,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1331940.83,
"financial_exposure_usd": 3131120.11,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106824",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-05T17:44:00Z",
"trace_id": "1cfbcd89-0a03-993f-541d-d8e410bd3a32"
} | {
"account_age_days": 1339,
"account_id": "ACCT-DABB0534C3CC",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_3",
"session_entropy": 0.144
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 146,
"timestamp": "2026-01-05T15:14:00Z",
"transaction_amount_usd": 1.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 858.43,
"financial_exposure_usd": 1781.78,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101718",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "medium",
"timestamp": "2026-01-02T04:38:00Z",
"trace_id": "df1ae418-47e6-6821-c75c-1ef385311aa1"
} | {
"account_age_days": 1314,
"account_id": "ACCT-9B579E62CBB0",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 219,
"timestamp": "2026-01-02T04:38:00Z",
"transaction_amount_usd": 95727.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 30963.07,
"financial_exposure_usd": 68065.04,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105098",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-04T12:58:00Z",
"trace_id": "05cf7b36-5cf4-f8fb-8262-02120d219c7f"
} | {
"account_age_days": 279,
"account_id": "ACCT-14A480E72245",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_1",
"session_entropy": 0.738
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 233,
"timestamp": "2026-01-04T10:00:00Z",
"transaction_amount_usd": 5.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6226893.46,
"financial_exposure_usd": 6466211.22,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106404",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-05T10:44:00Z",
"trace_id": "9e7ec598-25ea-020e-c296-2d5e4039ea44"
} | {
"account_age_days": 648,
"account_id": "ACCT-57AF5649E443",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 232,
"timestamp": "2026-01-04T23:14:00Z",
"transaction_amount_usd": 10.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3701914.02,
"financial_exposure_usd": 4831424.45,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105570",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-04T20:50:00Z",
"trace_id": "5b25bef0-1ab3-877d-e93c-2ab87ab1fad0"
} | {
"account_age_days": 934,
"account_id": "ACCT-41A933F8ABED",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.23
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 132,
"timestamp": "2026-01-04T08:54:00Z",
"transaction_amount_usd": 0.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6650994.83,
"financial_exposure_usd": 6941771.44,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101160",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-01T19:20:00Z",
"trace_id": "5dc81f1e-a86a-8bba-e7df-0252ea752da7"
} | {
"account_age_days": 674,
"account_id": "ACCT-83DE60FDBE4F",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.791
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 329,
"timestamp": "2026-01-01T19:20:00Z",
"transaction_amount_usd": 10412.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 317421.25,
"financial_exposure_usd": 559636.43,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107226",
"label": "benign",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-06T00:26:00Z",
"trace_id": "1da1132f-2fb8-996e-bf3c-e76398719978"
} | {
"account_age_days": 334,
"account_id": "ACCT-E5A139234B19",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 815,
"timestamp": "2026-01-06T00:26:00Z",
"transaction_amount_usd": 11579.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 705.53,
"financial_exposure_usd": 882.39,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104330",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-04T00:10:00Z",
"trace_id": "07e7cc80-4566-f50e-1d05-e8a9f20273cb"
} | {
"account_age_days": 132,
"account_id": "ACCT-000E74C23E65",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.783
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 599,
"timestamp": "2026-01-04T00:10:00Z",
"transaction_amount_usd": 2952559
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.822,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4482557.33,
"financial_exposure_usd": 5145730.41,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102930",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "medium",
"timestamp": "2026-01-03T00:50:00Z",
"trace_id": "82e74fe5-efbf-e3b7-2a1d-30f0b149cbb1"
} | {
"account_age_days": 1685,
"account_id": "ACCT-001EF3BA498E",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 88,
"timestamp": "2026-01-03T00:50:00Z",
"transaction_amount_usd": 94093.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1286934.85,
"financial_exposure_usd": 1358946.42,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105611",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "critical",
"timestamp": "2026-01-04T21:31:00Z",
"trace_id": "6b04ec37-772d-7c0d-f032-b99aba05cf54"
} | {
"account_age_days": 328,
"account_id": "ACCT-03CCED124398",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.504
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1043,
"timestamp": "2026-01-04T21:31:00Z",
"transaction_amount_usd": 254490.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1851565.22,
"financial_exposure_usd": 3791079.06,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104020",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-03T19:00:00Z",
"trace_id": "8dded431-27e7-47b8-f36a-53689916d004"
} | {
"account_age_days": 149,
"account_id": "ACCT-266A041F4AC4",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 383,
"timestamp": "2026-01-03T08:51:00Z",
"transaction_amount_usd": 0.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2481422.4,
"financial_exposure_usd": 4546842.53,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105313",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-04T16:33:00Z",
"trace_id": "8a0b0112-d39b-1f81-fe92-5149f729b12e"
} | {
"account_age_days": 139,
"account_id": "ACCT-6CA8B8E034C3",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.324
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1174,
"timestamp": "2026-01-04T16:33:00Z",
"transaction_amount_usd": 1786982.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 551737.92,
"financial_exposure_usd": 1017023.06,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101950",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-02T08:30:00Z",
"trace_id": "78ac1538-2f79-8e0f-d7e7-ae912469e0b2"
} | {
"account_age_days": 419,
"account_id": "ACCT-CD9A5A77AA0F",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 375,
"timestamp": "2026-01-01T20:39:00Z",
"transaction_amount_usd": 2.42
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.765,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 680303.99,
"financial_exposure_usd": 781731.2,
"recoverable_pct": 0.283
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108231",
"label": "benign",
"label_confidence": 0.667,
"severity": "low",
"timestamp": "2026-01-06T17:11:00Z",
"trace_id": "e529e62e-6205-a77b-5d21-67078dbe3a83"
} | {
"account_age_days": 1841,
"account_id": "ACCT-401E64C1FDA3",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.828
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1067,
"timestamp": "2026-01-06T17:11:00Z",
"transaction_amount_usd": 4735.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1451.71,
"financial_exposure_usd": 2545.46,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103470",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-03T09:50:00Z",
"trace_id": "c7700230-d550-0cad-29cf-2cd4dc140b71"
} | {
"account_age_days": 1275,
"account_id": "ACCT-117E9F5D41A7",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.771
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 521,
"timestamp": "2026-01-03T09:50:00Z",
"transaction_amount_usd": 1206236.05
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5864519.24,
"financial_exposure_usd": 6014001.36,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100044",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-01T00:44:00Z",
"trace_id": "5c311464-82c2-99f0-7487-d7727f0386fa"
} | {
"account_age_days": 505,
"account_id": "ACCT-8BEB4E78E683",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.746
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 316,
"timestamp": "2026-01-01T00:44:00Z",
"transaction_amount_usd": 68242.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 454767.16,
"financial_exposure_usd": 842475.54,
"recoverable_pct": 0.294
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105821",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "critical",
"timestamp": "2026-01-05T01:01:00Z",
"trace_id": "97b55614-6907-9b82-b3d4-d44f90a7397b"
} | {
"account_age_days": 1121,
"account_id": "ACCT-E6314B4FAC4B",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_2",
"session_entropy": 0.393
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 89,
"timestamp": "2026-01-04T18:04:00Z",
"transaction_amount_usd": 16.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 8258834.4,
"financial_exposure_usd": 8415398.25,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103823",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-03T15:43:00Z",
"trace_id": "5bd4ad77-685e-7b2c-75b2-d4f10c4d2c43"
} | {
"account_age_days": 824,
"account_id": "ACCT-42430066CCED",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 989,
"timestamp": "2026-01-03T15:43:00Z",
"transaction_amount_usd": 515308.22
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.468,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3160196.71,
"financial_exposure_usd": 6090408.49,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107973",
"label": "benign",
"label_confidence": 0.534,
"severity": "high",
"timestamp": "2026-01-06T12:53:00Z",
"trace_id": "cb0bd41f-3612-2e20-124a-279c185a3e94"
} | {
"account_age_days": 517,
"account_id": "ACCT-7215C694DB8F",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_1",
"session_entropy": 0.605
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 856,
"timestamp": "2026-01-06T12:53:00Z",
"transaction_amount_usd": 5330.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 510.79,
"financial_exposure_usd": 843.69,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103844",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-03T16:04:00Z",
"trace_id": "cd74ecc2-bc18-91f3-89ec-bf928dc44bc3"
} | {
"account_age_days": 1904,
"account_id": "ACCT-85FBAEC90A38",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 339,
"timestamp": "2026-01-03T16:04:00Z",
"transaction_amount_usd": 1277163.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.907,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3697823.1,
"financial_exposure_usd": 5699415.95,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102066",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-02T10:26:00Z",
"trace_id": "486528a3-5f5e-1673-26b7-454f5c91de34"
} | {
"account_age_days": 92,
"account_id": "ACCT-8208EC590A39",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_1",
"session_entropy": 0.405
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 951,
"timestamp": "2026-01-02T10:26:00Z",
"transaction_amount_usd": 63170.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.394,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 565051.65,
"financial_exposure_usd": 1108073.08,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102997",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "critical",
"timestamp": "2026-01-03T01:57:00Z",
"trace_id": "ed892cea-82a8-a489-e000-aaedd4049a7a"
} | {
"account_age_days": 1815,
"account_id": "ACCT-DD4F3197CB6E",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.479
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 715,
"timestamp": "2026-01-03T01:57:00Z",
"transaction_amount_usd": 10734.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.547,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 715271.6,
"financial_exposure_usd": 928460.07,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109869",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-07T20:29:00Z",
"trace_id": "ad611063-7f99-ff25-e404-724d84756a4d"
} | {
"account_age_days": 956,
"account_id": "ACCT-60BC7FEC62E1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.827
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 572,
"timestamp": "2026-01-07T20:29:00Z",
"transaction_amount_usd": 13158.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3265.94,
"financial_exposure_usd": 4300.71,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108996",
"label": "benign",
"label_confidence": 0.685,
"severity": "low",
"timestamp": "2026-01-07T05:56:00Z",
"trace_id": "b0132594-14fe-3c54-d39a-1a1bf1071ff5"
} | {
"account_age_days": 140,
"account_id": "ACCT-169E7765E078",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.679
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 610,
"timestamp": "2026-01-07T05:56:00Z",
"transaction_amount_usd": 8391.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1318.74,
"financial_exposure_usd": 2508.37,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106280",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-05T08:40:00Z",
"trace_id": "3d521704-5541-0bd6-7244-b97ac4f3df37"
} | {
"account_age_days": 765,
"account_id": "ACCT-992E5ABB9C06",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_3",
"session_entropy": 0.547
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 697,
"timestamp": "2026-01-05T08:40:00Z",
"transaction_amount_usd": 1982494.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2310842.91,
"financial_exposure_usd": 3804065.78,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108241",
"label": "benign",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-06T17:21:00Z",
"trace_id": "8cde4a88-0719-8f62-b905-a90c9f438217"
} | {
"account_age_days": 1300,
"account_id": "ACCT-0DC8944222EE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.742
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 318,
"timestamp": "2026-01-06T11:52:00Z",
"transaction_amount_usd": 12.61
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 911.59,
"financial_exposure_usd": 1870.19,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100174",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-01T02:54:00Z",
"trace_id": "f9a61744-93ef-e8f0-395c-0d6273c7fd75"
} | {
"account_age_days": 899,
"account_id": "ACCT-1F19297EBF86",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.241
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 716,
"timestamp": "2026-01-01T02:54:00Z",
"transaction_amount_usd": 28237.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 440856.11,
"financial_exposure_usd": 877442.14,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105158",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-04T13:58:00Z",
"trace_id": "6548dd89-9fc7-79f8-92ed-fe6ea43e9eac"
} | {
"account_age_days": 1534,
"account_id": "ACCT-BDBA79A4AAAC",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 363,
"timestamp": "2026-01-04T13:58:00Z",
"transaction_amount_usd": 1881156
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1340038.01,
"financial_exposure_usd": 2710788.55,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104904",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-04T09:44:00Z",
"trace_id": "6479a314-626f-062e-1e5b-19b59e45ee49"
} | {
"account_age_days": 1370,
"account_id": "ACCT-035733490809",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.125
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1160,
"timestamp": "2026-01-04T09:44:00Z",
"transaction_amount_usd": 1181747.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2925478.34,
"financial_exposure_usd": 3410568.52,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106083",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-05T05:23:00Z",
"trace_id": "8cf1bc1c-1407-63b2-732f-e11a6d923f1c"
} | {
"account_age_days": 234,
"account_id": "ACCT-0CBDD9B6A8FF",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 770,
"timestamp": "2026-01-05T05:23:00Z",
"transaction_amount_usd": 2477919.48
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1600523.71,
"financial_exposure_usd": 1954639.31,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106003",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-05T04:03:00Z",
"trace_id": "44a08d50-dc41-58ab-05bb-a0968c189f5e"
} | {
"account_age_days": 1802,
"account_id": "ACCT-1DD8B255AF85",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_1",
"session_entropy": 0.193
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 141,
"timestamp": "2026-01-04T19:33:00Z",
"transaction_amount_usd": 6.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2559404.8,
"financial_exposure_usd": 3382608.03,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102412",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "low",
"timestamp": "2026-01-02T16:12:00Z",
"trace_id": "f815c4d3-7d81-b160-8a8a-cb45e0b094e6"
} | {
"account_age_days": 149,
"account_id": "ACCT-0A3C10AEF8D2",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.744
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1003,
"timestamp": "2026-01-02T16:12:00Z",
"transaction_amount_usd": 10621.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 362883.83,
"financial_exposure_usd": 580085.03,
"recoverable_pct": 0.226
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100577",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-01T09:37:00Z",
"trace_id": "59a39d2e-0365-d0cd-f584-be70337d1d2a"
} | {
"account_age_days": 919,
"account_id": "ACCT-DF628F0B9F9C",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_3",
"session_entropy": 0.681
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 133,
"timestamp": "2026-01-01T04:08:00Z",
"transaction_amount_usd": 4.38
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 387996.54,
"financial_exposure_usd": 711380.5,
"recoverable_pct": 0.142
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109051",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-07T06:51:00Z",
"trace_id": "21962ed7-9dd1-6d2d-ca75-26f656a2f0bb"
} | {
"account_age_days": 1072,
"account_id": "ACCT-CC857D0F8D7F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.402
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 85,
"timestamp": "2026-01-07T02:21:00Z",
"transaction_amount_usd": 15.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4232.32,
"financial_exposure_usd": 6356.2,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105161",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-04T14:01:00Z",
"trace_id": "228964c1-541a-dd4c-be4a-7644ea6d0f65"
} | {
"account_age_days": 1313,
"account_id": "ACCT-DFA69C2394FE",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_1",
"session_entropy": 0.447
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 172,
"timestamp": "2026-01-04T03:19:00Z",
"transaction_amount_usd": 23.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1970991.59,
"financial_exposure_usd": 3261505.58,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108829",
"label": "benign",
"label_confidence": 0.612,
"severity": "low",
"timestamp": "2026-01-07T03:09:00Z",
"trace_id": "30457dc0-c174-514f-a037-6c6969a3f220"
} | {
"account_age_days": 1869,
"account_id": "ACCT-01938271B70D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.227
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 251,
"timestamp": "2026-01-06T16:00:00Z",
"transaction_amount_usd": 24.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2852.07,
"financial_exposure_usd": 4789.22,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102477",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "medium",
"timestamp": "2026-01-02T17:17:00Z",
"trace_id": "bafaa241-00c0-c3d5-1758-96b6568cd342"
} | {
"account_age_days": 318,
"account_id": "ACCT-A2ED2AA5CDD6",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 402,
"timestamp": "2026-01-02T17:17:00Z",
"transaction_amount_usd": 2371.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 108341.53,
"financial_exposure_usd": 210844.27,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109609",
"label": "benign",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-07T16:09:00Z",
"trace_id": "3cd94b21-5bd2-6ed7-8756-5ff4f56de100"
} | {
"account_age_days": 1472,
"account_id": "ACCT-D470ECE23963",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 89,
"timestamp": "2026-01-07T12:10:00Z",
"transaction_amount_usd": 20.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4286.1,
"financial_exposure_usd": 4475,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101969",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "critical",
"timestamp": "2026-01-02T08:49:00Z",
"trace_id": "f590d942-dd96-3b08-c0db-304b65714709"
} | {
"account_age_days": 1683,
"account_id": "ACCT-5B07F592ED72",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_1",
"session_entropy": 0.742
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 84,
"timestamp": "2026-01-02T08:49:00Z",
"transaction_amount_usd": 36902.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.584,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 483887.74,
"financial_exposure_usd": 516182.88,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104416",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-04T01:36:00Z",
"trace_id": "ceb066e1-ea1f-93e6-0d11-7c1a927c0c2f"
} | {
"account_age_days": 1390,
"account_id": "ACCT-B740E3F66932",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.886
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 581,
"timestamp": "2026-01-04T01:36:00Z",
"transaction_amount_usd": 460718.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.848,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3417039.31,
"financial_exposure_usd": 6977413.2,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100451",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-01T07:31:00Z",
"trace_id": "c813d0f2-39af-1b9c-25b8-33683e6adedb"
} | {
"account_age_days": 117,
"account_id": "ACCT-A8F0EA32ACC0",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 366,
"timestamp": "2026-01-01T07:31:00Z",
"transaction_amount_usd": 85705.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 561031.57,
"financial_exposure_usd": 646350.29,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101760",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-02T05:20:00Z",
"trace_id": "2f9bc927-ba3f-7e5a-bc48-d56cd1cad210"
} | {
"account_age_days": 1619,
"account_id": "ACCT-BCDFE08F0353",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_2",
"session_entropy": 0.206
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 226,
"timestamp": "2026-01-01T18:14:00Z",
"transaction_amount_usd": 23.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 388623.87,
"financial_exposure_usd": 529493.1,
"recoverable_pct": 0.107
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104846",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "high",
"timestamp": "2026-01-04T08:46:00Z",
"trace_id": "18363a49-c3ed-6782-a095-46b453656c93"
} | {
"account_age_days": 1760,
"account_id": "ACCT-0F21FB6996D9",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 769,
"timestamp": "2026-01-04T08:46:00Z",
"transaction_amount_usd": 2311826.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1728327.65,
"financial_exposure_usd": 4240884.75,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103280",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "critical",
"timestamp": "2026-01-03T06:40:00Z",
"trace_id": "f71c58e1-1782-205b-9b11-28045ebce5b1"
} | {
"account_age_days": 1496,
"account_id": "ACCT-877A932AB881",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.199
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 89,
"timestamp": "2026-01-02T20:05:00Z",
"transaction_amount_usd": 7.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 303917.98,
"financial_exposure_usd": 640136.85,
"recoverable_pct": 0.353
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101712",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "critical",
"timestamp": "2026-01-02T04:32:00Z",
"trace_id": "2b525553-ca9e-bb22-1f45-b4de56eaa72b"
} | {
"account_age_days": 1838,
"account_id": "ACCT-5524A3C338FC",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.39
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 778,
"timestamp": "2026-01-02T04:32:00Z",
"transaction_amount_usd": 92815.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 265122.32,
"financial_exposure_usd": 590226.59,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105961",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "low",
"timestamp": "2026-01-05T03:21:00Z",
"trace_id": "eee72e7e-18a3-3051-f880-4ec624cf57a9"
} | {
"account_age_days": 1652,
"account_id": "ACCT-74F8E219A41C",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_3",
"session_entropy": 0.116
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 654,
"timestamp": "2026-01-05T03:21:00Z",
"transaction_amount_usd": 1024873.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2463029.93,
"financial_exposure_usd": 2517407.06,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102670",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "critical",
"timestamp": "2026-01-02T20:30:00Z",
"trace_id": "9a594866-899f-1e93-10cd-03b1df80557e"
} | {
"account_age_days": 136,
"account_id": "ACCT-4F8958283760",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 657,
"timestamp": "2026-01-02T20:30:00Z",
"transaction_amount_usd": 2635.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.485,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 388323.67,
"financial_exposure_usd": 423561.56,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.